Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
From MaRDI portal
Publication:2056728
DOI10.1007/978-3-030-77886-6_6zbMath1479.94125OpenAlexW3167202156MaRDI QIDQ2056728
Gregor Leander, Håvard Raddum, Patrick Derbez, Yann Rotella, Gaëtan Leurent, Lukas Stennes, David Rupprecht, Christof Beierle
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77886-6_6
Related Items
Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2 ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Constructing and deconstructing intentional weaknesses in symmetric ciphers
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12--13, 2010. Revised selected papers
- On ``bent functions
- A family of difference sets in non-cyclic groups
- Cryptanalysis of the FLIP Family of Stream Ciphers
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Cryptanalysis of Luffa v2 Components
- Hybrid approach for solving multivariate systems over finite fields
- Fast Exhaustive Search for Polynomial Systems in ${\mathbb{F}_2}$
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems
- Advances in Cryptology - CRYPTO 2003
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Shift-register synthesis and BCH decoding
This page was built for publication: Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2